HK1040788A1 - 檢查聯網設備安全脆弱性的方法和裝置 - Google Patents

檢查聯網設備安全脆弱性的方法和裝置

Info

Publication number
HK1040788A1
HK1040788A1 HK02102420.4A HK02102420A HK1040788A1 HK 1040788 A1 HK1040788 A1 HK 1040788A1 HK 02102420 A HK02102420 A HK 02102420A HK 1040788 A1 HK1040788 A1 HK 1040788A1
Authority
HK
Hong Kong
Prior art keywords
list
addresses
shareable
networked devices
security vulnerability
Prior art date
Application number
HK02102420.4A
Other languages
English (en)
Inventor
Fudge Bob
Original Assignee
Mci Worldcom Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mci Worldcom Inc filed Critical Mci Worldcom Inc
Publication of HK1040788A1 publication Critical patent/HK1040788A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
  • Air Bags (AREA)
HK02102420.4A 1998-12-31 2002-03-28 檢查聯網設備安全脆弱性的方法和裝置 HK1040788A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/224,132 US6205552B1 (en) 1998-12-31 1998-12-31 Method and apparatus for checking security vulnerability of networked devices
PCT/US1999/030211 WO2000041059A1 (en) 1998-12-31 1999-12-17 Method and apparatus for checking security vulnerability of networked devices

Publications (1)

Publication Number Publication Date
HK1040788A1 true HK1040788A1 (zh) 2002-06-21

Family

ID=22839389

Family Applications (1)

Application Number Title Priority Date Filing Date
HK02102420.4A HK1040788A1 (zh) 1998-12-31 2002-03-28 檢查聯網設備安全脆弱性的方法和裝置

Country Status (8)

Country Link
US (1) US6205552B1 (zh)
EP (1) EP1147465B1 (zh)
JP (1) JP2002534877A (zh)
AT (1) ATE299604T1 (zh)
CA (1) CA2355895A1 (zh)
DE (1) DE69926147T2 (zh)
HK (1) HK1040788A1 (zh)
WO (1) WO2000041059A1 (zh)

Families Citing this family (106)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IL143573A0 (en) 1998-12-09 2002-04-21 Network Ice Corp A method and apparatus for providing network and computer system security
US6895436B1 (en) * 1999-07-01 2005-05-17 International Business Machines Corporation Method and system for evaluating network security
US7346929B1 (en) * 1999-07-29 2008-03-18 International Business Machines Corporation Method and apparatus for auditing network security
US8006243B2 (en) * 1999-12-07 2011-08-23 International Business Machines Corporation Method and apparatus for remote installation of network drivers and software
ATE414943T1 (de) * 2000-03-03 2008-12-15 Ibm System zur bestimmung von schwächen von web- anwendungen
US7200640B1 (en) * 2000-03-16 2007-04-03 Cole James M Continuously tunable, graphic internet navigation tool
US20010034847A1 (en) * 2000-03-27 2001-10-25 Gaul,Jr. Stephen E. Internet/network security method and system for checking security of a client from a remote facility
US6430395B2 (en) * 2000-04-07 2002-08-06 Commil Ltd. Wireless private branch exchange (WPBX) and communicating between mobile units and base stations
AU2001262958A1 (en) * 2000-04-28 2001-11-12 Internet Security Systems, Inc. Method and system for managing computer security information
WO2001084775A2 (en) * 2000-04-28 2001-11-08 Internet Security Systems, Inc. System and method for managing security events on a network
US20050050163A1 (en) * 2000-05-24 2005-03-03 Cole James M. Continuously tunable, graphic internet navigation tool
US9027121B2 (en) 2000-10-10 2015-05-05 International Business Machines Corporation Method and system for creating a record for one or more computer security incidents
US7146305B2 (en) * 2000-10-24 2006-12-05 Vcis, Inc. Analytical virtual machine
JP2002157171A (ja) 2000-11-17 2002-05-31 Canon Inc 情報処理装置、機器管理プログラム、機器管理プログラムが格納された記録媒体、及び機器管理方法
US7130466B2 (en) * 2000-12-21 2006-10-31 Cobion Ag System and method for compiling images from a database and comparing the compiled images with known images
US7168093B2 (en) * 2001-01-25 2007-01-23 Solutionary, Inc. Method and apparatus for verifying the integrity and security of computer networks and implementation of counter measures
US20020147803A1 (en) * 2001-01-31 2002-10-10 Dodd Timothy David Method and system for calculating risk in association with a security audit of a computer network
US8135815B2 (en) * 2001-03-27 2012-03-13 Redseal Systems, Inc. Method and apparatus for network wide policy-based analysis of configurations of devices
US6895383B2 (en) * 2001-03-29 2005-05-17 Accenture Sas Overall risk in a system
US6620995B2 (en) * 2001-03-30 2003-09-16 Sergiy Victorovich Vasylyev Non-imaging system for radiant energy flux transformation
US7657419B2 (en) * 2001-06-19 2010-02-02 International Business Machines Corporation Analytical virtual machine
US7003561B1 (en) * 2001-06-29 2006-02-21 Mcafee, Inc. System, method and computer program product for improved efficiency in network assessment utilizing a port status pre-qualification procedure
US7228566B2 (en) * 2001-07-10 2007-06-05 Core Sdi, Incorporated Automated computer system security compromise
US6986160B1 (en) * 2001-08-31 2006-01-10 Mcafee, Inc. Security scanning system and method utilizing generic IP addresses
US6546493B1 (en) * 2001-11-30 2003-04-08 Networks Associates Technology, Inc. System, method and computer program product for risk assessment scanning based on detected anomalous events
WO2003058451A1 (en) * 2002-01-04 2003-07-17 Internet Security Systems, Inc. System and method for the managed security control of processes on a computer system
US7543056B2 (en) 2002-01-15 2009-06-02 Mcafee, Inc. System and method for network vulnerability detection and reporting
US7243148B2 (en) * 2002-01-15 2007-07-10 Mcafee, Inc. System and method for network vulnerability detection and reporting
US7257630B2 (en) * 2002-01-15 2007-08-14 Mcafee, Inc. System and method for network vulnerability detection and reporting
JP4190765B2 (ja) * 2002-01-18 2008-12-03 株式会社コムスクエア セキュリティレベル情報提供方法及びシステム
US7370360B2 (en) * 2002-05-13 2008-05-06 International Business Machines Corporation Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine
US7509675B2 (en) * 2002-05-29 2009-03-24 At&T Intellectual Property I, L.P. Non-invasive monitoring of the effectiveness of electronic security services
US7277937B2 (en) * 2002-07-17 2007-10-02 Core Sdi, Incorporated Distributed computing using syscall proxying
US6952779B1 (en) * 2002-10-01 2005-10-04 Gideon Cohen System and method for risk detection and analysis in a computer network
US8407798B1 (en) 2002-10-01 2013-03-26 Skybox Secutiry Inc. Method for simulation aided security event management
WO2004034229A2 (en) 2002-10-10 2004-04-22 Rocksteady Networks, Inc. System and method for providing access control
WO2004036371A2 (en) * 2002-10-16 2004-04-29 Rocksteady Networks, Inc. System and method for dynamic bandwidth provisioning
US8230497B2 (en) * 2002-11-04 2012-07-24 Hewlett-Packard Development Company, L.P. Method of identifying software vulnerabilities on a computer system
US8312535B1 (en) 2002-12-12 2012-11-13 Mcafee, Inc. System, method, and computer program product for interfacing a plurality of related applications
US8122498B1 (en) 2002-12-12 2012-02-21 Mcafee, Inc. Combined multiple-application alert system and method
US8239941B1 (en) 2002-12-13 2012-08-07 Mcafee, Inc. Push alert system, method, and computer program product
US8990723B1 (en) 2002-12-13 2015-03-24 Mcafee, Inc. System, method, and computer program product for managing a plurality of applications via a single interface
US7913303B1 (en) 2003-01-21 2011-03-22 International Business Machines Corporation Method and system for dynamically protecting a computer system from attack
US7627891B2 (en) * 2003-02-14 2009-12-01 Preventsys, Inc. Network audit and policy assurance system
US7624422B2 (en) 2003-02-14 2009-11-24 Preventsys, Inc. System and method for security information normalization
EP1469651A3 (en) * 2003-04-17 2004-12-29 CC CompuNet Computer AG & Co. oHG Computer network leakage detection
US20070113272A2 (en) 2003-07-01 2007-05-17 Securityprofiling, Inc. Real-time vulnerability monitoring
US9100431B2 (en) 2003-07-01 2015-08-04 Securityprofiling, Llc Computer program product and apparatus for multi-path remediation
US9118710B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc System, method, and computer program product for reporting an occurrence in different manners
US9118711B2 (en) * 2003-07-01 2015-08-25 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9118709B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US8984644B2 (en) 2003-07-01 2015-03-17 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9350752B2 (en) 2003-07-01 2016-05-24 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9118708B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Multi-path remediation
US7624438B2 (en) 2003-08-20 2009-11-24 Eric White System and method for providing a secure connection between networked computers
JP4251061B2 (ja) * 2003-10-03 2009-04-08 ブリヂストンスポーツ株式会社 ゴルフクラブヘッド
US7657938B2 (en) * 2003-10-28 2010-02-02 International Business Machines Corporation Method and system for protecting computer networks by altering unwanted network data traffic
US8136163B2 (en) * 2004-01-16 2012-03-13 International Business Machines Corporation Method, apparatus and program storage device for providing automated tracking of security vulnerabilities
CA2553552A1 (en) * 2004-02-11 2005-08-25 Spi Dynamics, Inc. System and method for testing web applications with recursive discovery and analysis
US20060282494A1 (en) * 2004-02-11 2006-12-14 Caleb Sima Interactive web crawling
US7765597B2 (en) * 2004-02-11 2010-07-27 Hewlett-Packard Development Company, L.P. Integrated crawling and auditing of web applications and web content
US7665130B2 (en) * 2004-03-10 2010-02-16 Eric White System and method for double-capture/double-redirect to a different location
US20050204022A1 (en) * 2004-03-10 2005-09-15 Keith Johnston System and method for network management XML architectural abstraction
US7610621B2 (en) * 2004-03-10 2009-10-27 Eric White System and method for behavior-based firewall modeling
US7509625B2 (en) 2004-03-10 2009-03-24 Eric White System and method for comprehensive code generation for system management
US7590728B2 (en) 2004-03-10 2009-09-15 Eric White System and method for detection of aberrant network behavior by clients of a network access gateway
US8543710B2 (en) * 2004-03-10 2013-09-24 Rpx Corporation Method and system for controlling network access
US8201257B1 (en) 2004-03-31 2012-06-12 Mcafee, Inc. System and method of managing network security risks
US7519954B1 (en) 2004-04-08 2009-04-14 Mcafee, Inc. System and method of operating system identification
GB2414889A (en) * 2004-04-30 2005-12-07 Hewlett Packard Development Co Network administration
US7665119B2 (en) 2004-09-03 2010-02-16 Secure Elements, Inc. Policy-based selection of remediation
US20060085852A1 (en) * 2004-10-20 2006-04-20 Caleb Sima Enterprise assessment management
US20060101517A1 (en) * 2004-10-28 2006-05-11 Banzhof Carl E Inventory management-based computer vulnerability resolution system
JP4551866B2 (ja) * 2005-12-07 2010-09-29 株式会社リコー 通信システムおよび呼制御サーバ装置およびプログラム
JP2007249579A (ja) * 2006-03-15 2007-09-27 Fujitsu Ltd ワーム対策パラメータ決定プログラム、ワーム対策パラメータ決定装置、ノード数決定プログラム、ノード数決定装置およびノード数制限システム
US20080183626A1 (en) * 2007-01-31 2008-07-31 Francisco Romero Software license agreement management based on temporary usage
US20090038014A1 (en) * 2007-07-31 2009-02-05 Paul Force System and method for tracking remediation of security vulnerabilities
US8037536B2 (en) * 2007-11-14 2011-10-11 Bank Of America Corporation Risk scoring system for the prevention of malware
KR20090121579A (ko) * 2008-05-22 2009-11-26 주식회사 이베이지마켓 서버의 취약점을 점검하기 위한 시스템 및 그 방법
KR101225870B1 (ko) * 2010-06-07 2013-01-24 삼성에스디에스 주식회사 안티 멀웨어 시스템 및 그의 동작 방법
JP5425840B2 (ja) 2010-06-07 2014-02-26 サムソン エスディーエス カンパニー リミテッド アンチマルウェアシステム及びその動作方法
US8365287B2 (en) * 2010-06-18 2013-01-29 Samsung Sds Co., Ltd. Anti-malware system and operating method thereof
US8918785B1 (en) * 2010-12-29 2014-12-23 Amazon Technologies, Inc. Managing virtual machine network through security assessment
US8745734B1 (en) 2010-12-29 2014-06-03 Amazon Technologies, Inc. Managing virtual computing testing
EP2500838A1 (en) 2011-03-16 2012-09-19 Samsung SDS Co. Ltd. SOC-based device for packet filtering and packet filtering method thereof
US10341509B2 (en) * 2013-02-24 2019-07-02 Qualys, Inc. Client device state collection and network-based processing solution
US9246935B2 (en) 2013-10-14 2016-01-26 Intuit Inc. Method and system for dynamic and comprehensive vulnerability management
US9313281B1 (en) 2013-11-13 2016-04-12 Intuit Inc. Method and system for creating and dynamically deploying resource specific discovery agents for determining the state of a cloud computing environment
US9501345B1 (en) 2013-12-23 2016-11-22 Intuit Inc. Method and system for creating enriched log data
US9323926B2 (en) 2013-12-30 2016-04-26 Intuit Inc. Method and system for intrusion and extrusion detection
US20150304343A1 (en) 2014-04-18 2015-10-22 Intuit Inc. Method and system for providing self-monitoring, self-reporting, and self-repairing virtual assets in a cloud computing environment
US9325726B2 (en) 2014-02-03 2016-04-26 Intuit Inc. Method and system for virtual asset assisted extrusion and intrusion detection in a cloud computing environment
US10757133B2 (en) 2014-02-21 2020-08-25 Intuit Inc. Method and system for creating and deploying virtual assets
US9866581B2 (en) 2014-06-30 2018-01-09 Intuit Inc. Method and system for secure delivery of information to computing environments
US9276945B2 (en) * 2014-04-07 2016-03-01 Intuit Inc. Method and system for providing security aware applications
US9419986B2 (en) * 2014-03-26 2016-08-16 Symantec Corporation System to identify machines infected by malware applying linguistic analysis to network requests from endpoints
US9245117B2 (en) 2014-03-31 2016-01-26 Intuit Inc. Method and system for comparing different versions of a cloud based application in a production environment using segregated backend systems
US11294700B2 (en) 2014-04-18 2022-04-05 Intuit Inc. Method and system for enabling self-monitoring virtual assets to correlate external events with characteristic patterns associated with the virtual assets
US9374389B2 (en) 2014-04-25 2016-06-21 Intuit Inc. Method and system for ensuring an application conforms with security and regulatory controls prior to deployment
US9900322B2 (en) 2014-04-30 2018-02-20 Intuit Inc. Method and system for providing permissions management
US9319415B2 (en) 2014-04-30 2016-04-19 Intuit Inc. Method and system for providing reference architecture pattern-based permissions management
US9330263B2 (en) 2014-05-27 2016-05-03 Intuit Inc. Method and apparatus for automating the building of threat models for the public cloud
US9473481B2 (en) 2014-07-31 2016-10-18 Intuit Inc. Method and system for providing a virtual asset perimeter
US10102082B2 (en) 2014-07-31 2018-10-16 Intuit Inc. Method and system for providing automated self-healing virtual assets
US10264008B2 (en) 2015-10-08 2019-04-16 Bank Of America Corporation Vulnerability exposing application characteristic variation identification engine
US11196762B2 (en) 2019-07-31 2021-12-07 International Business Machines Corporation Vulnerability scanner based on network profile

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5109484A (en) * 1986-04-09 1992-04-28 International Business Machines Corporation Self configuring terminal which polls loop network and generates list of connected devices for use in selectively downloading control programs
US5551053A (en) * 1994-02-28 1996-08-27 Eaton Corporation System and Method for assigning addresses to I/O devices in a control network and for verifying the assigned address of the devices
JPH09214493A (ja) * 1996-02-08 1997-08-15 Hitachi Ltd ネットワークシステム
US5892903A (en) * 1996-09-12 1999-04-06 Internet Security Systems, Inc. Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system
US5805801A (en) * 1997-01-09 1998-09-08 International Business Machines Corporation System and method for detecting and preventing security

Also Published As

Publication number Publication date
JP2002534877A (ja) 2002-10-15
EP1147465B1 (en) 2005-07-13
EP1147465A4 (en) 2003-04-02
US6205552B1 (en) 2001-03-20
CA2355895A1 (en) 2000-07-13
WO2000041059A1 (en) 2000-07-13
EP1147465A1 (en) 2001-10-24
DE69926147T2 (de) 2006-04-27
DE69926147D1 (de) 2005-08-18
ATE299604T1 (de) 2005-07-15

Similar Documents

Publication Publication Date Title
HK1040788A1 (zh) 檢查聯網設備安全脆弱性的方法和裝置
CN101542979B (zh) Mac地址的重复消除方法、网络设备管理系统、服务器以及信息设备
US7028338B1 (en) System, computer program, and method of cooperative response to threat to domain security
US7725578B2 (en) Providing status information to a device attached to an information infrastructure
CA2287871A1 (en) Secure document management system
ATE371342T1 (de) Verfahren und vorrichtung zur übertragung von datenpaketen von einem externen paketnetz zu einer mobilen funkstation
DE69939494D1 (de) Authentifizierungsverfahren und system
BR0010522A (pt) Métodos de proteção de dispositivo de comunicações e contra invasão de computador hospedeiro e método de comunicação com entidade remota, em sistema de comunicações
GB2392344A (en) Method and system for auto discovery of IP-based network elements
CN101415002B (zh) 防止报文攻击的方法、数据通信设备及通信系统
CN1863193B (zh) 实现网络安全装置安全策略的方法
CN105099683A (zh) 一种账户分配方法和装置
US7916733B2 (en) Data communication apparatus, data communication method, program, and storage medium
WO2003045011A3 (fr) Systeme et procede de gestion d'applications, dediees a des appareils connectes a un reseau-maison
TW200705887A (en) Apparatus, method for monitoring network, network system, network monitoring method and network communication method
CN108076165B (zh) 一种域名解析信息管理的方法、设备及系统
US8266113B2 (en) Methods, apparatus and articles of manufacture for computer file integrity and baseline maintenance
US8149723B2 (en) Systems and methods for discovering machines
CN101662368A (zh) 一种可对抗木马程式的网络数据过滤装置和相应方法
CN101867585B (zh) 支持IPv6多地址接入的业务控制方法和设备
CN112601229B (zh) 检测非法的装置和检测非法的方法
SE9801602D0 (sv) Arrangement, system and method relating to communication
CN100403743C (zh) 一种防范假冒网际协议以太网网关的方法
CN105635344A (zh) 一种ip地址分配方法、装置及系统
CN111147618A (zh) 一种通信方法、装置、电子设备和存储介质